Malware

Type: Keyphrase
Name: Malware
First reported 20 hours ago - Updated 2 hours ago - 2 reports

Micron, Wave Systems Collaborate

Semiconductor company, Micron Technology Inc. ( MU ) recently joined forces with Wave Systems Corp. ( WAVX ), an end-point security provider, to develop solutions to protect against malware attacks on embedded computing platforms.Wave Systems offers simple, ... [Published Yahoo! Finance - 2 hours ago]
First reported Apr 15 2014 - Updated 4 hours ago - 4 reports

Beware Of Malicious Android Icons In Disguise

Hackers are always coming up with ingenious ways to trick people into giving away information, or getting malware on their systems. As smartphone attacks are a relatively new phenomena, there are some particularly novel techniques on show, both from ethical ... [Published Know Your Mobile - 16 hours ago]
First reported 9 hours ago - Updated 4 hours ago - 5 reports

LaCie customer data at risk following year-long malware attack

French hardware maker LaCie is the latest high-profile cyber attack victim. The company recently revealed they were contacted by the FBI last month after suspicions were raised that malware was used to gain access to sensitive customer information.Upon ... [Published TechSpot - 4 hours ago]
First reported 21 hours ago - Updated 8 hours ago - 5 reports

LaCie admits to year-long malware security breach

Washington, Apr 16 (ANI): French hardware company, Lacie, which is a major retailer and tech company, has found itself to be the target of a major security breach by unidentified invaders.The company confirmed in a statement on Tuesday that malware successfully ... [Published TruthDive - 8 hours ago]
First reported Apr 15 2014 - Updated 9 hours ago - 2 reports

Signature-less Malware Detection: Finding an Evil in the Haystack

Learn about the tools, technologies and techniques required for comprehensive detection and remediation of advanced malware threats and why traditional signature-based approaches fall short of protecting your organization.BROWSE RELATED RESOURCESData ... [Published Bitpipe - 9 hours ago]
Entities: Malware, Threat, Security
First reported Apr 15 2014 - Updated 22 hours ago - 11 reports

Google Outlines Gmail Scanning in Updated Terms | News & Opinion

Google this week updated its terms of service[1] to specify how its automatic email scanning technology works. According to the revised document, Google software examines incoming and outgoing messages to create targeted ads. "Our automated systems analyze ... [Published DailyMe.Com - Apr 15 2014]
First reported 23 hours ago - Updated 23 hours ago - 2 reports

Crimeware or APT? Malware’s “Fifty Shades of Grey”

Some cybercriminals build massive botnets to use unsuspecting endpoints for spam, distributed denial-of-service (DDoS) attacks, or large-scale click fraud. With the aid of banking Trojans, other cybercriminals create smaller, specialized botnets that ... [Published Security Bloggers Network - 23 hours ago]
First reported Apr 15 2014 - Updated Apr 15 2014 - 5 reports

First phase of TrueCrypt audit finds no backdoors or malicious code

The first phase of the TrueCrypt security audit has come back with good results: security researchers have not found any evidence of backdoors or major security issues in the popular encryption software. This is only the first iteration of the audit, ... [Published SiliconANGLE - Apr 15 2014]
First reported Apr 14 2014 - Updated Apr 15 2014 - 2 reports

German space research centre hit by cyberattack

Security by Michael Moore |15 April 2014 Targeted APT malware assault infected computers used by top scientists.Germany's national space research centre has been hit by a malware attack that appears to stem from foreign, state-sponsored sources, it ... [Published Computer Business Review - Apr 15 2014]
First reported Apr 14 2014 - Updated Apr 15 2014 - 3 reports

Review: 8 secure browser alternatives to Chrome, IE, and Firefox

The Web browser has been a major infection vector for years, allowing malware to be transported to millions of computers through phishing, man-in-the-middle, SQL injection and countless other attacks. But what if there was a way to stop this madness ... [Published Security - Infoworld - Apr 15 2014]
First reported Apr 14 2014 - Updated Apr 14 2014 - 3 reports

German Aerospace Center Systems Found Infected with Spying Malware

The computers used by scientists and administrators from the German Aerospace Center were found infected with spying malware in an apparent cyber attack, according to German Magazine, Der Spiegel.The German Aerospace Center deals with information on rocket ... [Published Bitdefender - Apr 14 2014]
First reported Apr 14 2014 - Updated Apr 14 2014 - 2 reports

20% of malware generated in 2013 – PandaLabs

Twenty per cent of malware that has ever existed was created and distributed by cybercriminals during 2013, according to cloud security firm PandaLabs’ 2013 annual report.Last year saw the creation of 30 million new pieces of malicious software, with ... [Published HumanIPO - Apr 14 2014]

Quotes

"Just as a sender of a letter to a business colleague cannot"
"It’s unclear at this time just how many LaCie customers may have been exposed, but it would seem sensible for anyone who has bought a product from the firm in the last year to keep a close eye on their credit card bills and be on the lookout for unusual transactions" said veteran security expert Graham Cluley in a blog post . ®
"It also raises the question of security on those unattended devices which are more exposed to hacking. If you take the example of the [connected] car – if you can control your car remotely someone else will be interested in doing it as well. So it can be very attractive for hackers to attack those systems. It is not about the cost, it has to be secure by design, which is not so obvious."
In a statement, the company advised, "If you see a fraudulent charge on your card, please immediately contact the bank that issued your card. Major credit card companies typically guarantee cardholders will not be responsible for fraudulent charges. Please be on the lookout and review your account statements for any unauthorized activity."

More Content

All (12200) | News (7141) | Reports (2) | Blogs (5012) | Audio/Video (2) | Fact Sheets (4) | Press Releases (35)
sort by: Date | Relevance
Microsoft, TM and Intel offer SMEs ‘Good Bye XP... [Published Enterprise IT News - 26 mins ago]
About one-third of phishing attacks aimed at st... [Published MacTech Magazine - 35 mins ago]
Top 9 Mistakes of APT Victims: What They Are an... [Published SearchFinancialSecurity.com - 1 hour ago]
BlogMS Microsoft Team Blogs - New articles from... [Published TechNet Blogs - 1 hour ago]
Containerisation solves BYOD fears [Published iWeek - 1 hour ago]
Apple's App Store generated 85% more revenue th... [Published Phone Arena - 1 hour ago]
Understanding the Point-of-Sale Hacking Threat [Published Retail Online Integration - 1 hour ago]
Google Could Rank Websites That Use Encryption ... [Published TechWeekEurope UK - 1 hour ago]
Google: We scan all Gmail messages [Published Russia Today - 1 hour ago]
French hard-drive maker LaCie cops to YEAR LONG... [Published The Register - 1 hour ago]
Samsung 11.6" 16GB WiFi Chromebook - $179.99 [Published TigerDirect.com - 2 hours ago]
Enterprise mobile security: defending the wirel... [Published Engineering and Technology Magazine - 2 hours ago]
End of support for windows XP, not doomsday, sa... [Published The Guardian Nigeria - 2 hours ago]
How To Protect Your Android Phone From Harmful ... [Published Business Insider - 2 hours ago]
Avast vs. AVG: Which Antivirus Software is Bett... [Published Business News Daily - 2 hours ago]
Improving Security In the Fast-Paced World of M... [Published Bank Systems & Technology - 2 hours ago]
BsidesLA 2013 - Convincing Your Management, You... [Published SecurityTube.Net - 2 hours ago]
BsidesLA 2013 - Malware Automation - Christophe... [Published SecurityTube.Net - 2 hours ago]
Lacie confesses to year-long data breach as hac... [Published TheInquirer.net - 2 hours ago]
10 Ways to Protect Yourself from Tax Scams [Published Talkin' Cloud - 2 hours ago]
Micron, Wave Systems Collaborate [Published Yahoo! Finance - 2 hours ago]
Something still evil on 66.96.223.192/27 [Published Dynamoo Blog - 3 hours ago]
Windows XP use declining, but millions still wi... [Published Tech Republic - 3 hours ago]
Google codifies its right to crawl through your... [Published Sydney Morning Herald - 3 hours ago]
Bluefin Payment Systems Introduces PayConex™ P2... [Published PRWeb - 3 hours ago]
Google Clarifies Gmail Snooping in Updated ToS [Published E-Commerce Times - 3 hours ago]
From Russia with Code [Published Playboy - 3 hours ago]
Leave no trace: Tips to cover your digital foot... [Published CIO IT-Strategie für Manager - 3 hours ago]
LaCie customer data at risk following year-long... [Published TechSpot - 4 hours ago]
Cyber Security: 60% of Techies Don't Tell Bosse... [Published International Business Times UK - 4 hours ago]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
BlogMS Microsoft Team Blogs - New articles from... [Published TechNet Blogs - 1 hour ago]
227 Microsoft Team blogs searched, 56 blogs have new articles. 151 new articles found searching from 07-Apr-2014 to 13-Apr-2014 Categories: Dynamics , General , Industry Solutions , Internet , Microsoft Advertising , Microsoft Learning ...
BsidesLA 2013 - Convincing Your Management, You... [Published SecurityTube.Net - 2 hours ago]
As security professionals, almost every action we take comes down to making a risk-based decision. Web application vulnerabilities, malware infections, physical vulnerabilities, and much more all boils down to some combination of the likelihood of an ...
BsidesLA 2013 - Malware Automation - Christophe... [Published SecurityTube.Net - 2 hours ago]
Automation is key when it comes to production. The same is true for malware. Malware production has moved on from the traditional manual method to a more efficient automated assembly line. In this talk, I will take the audience on an over-the-shoulder ...
Something still evil on 66.96.223.192/27 [Published Dynamoo Blog - 3 hours ago]
Last week I wrote about a rogue netblock hosted by Network Operation Center in the US. Well, it's still spreading malware but now there are more domains active on this range.A full list of the subdomains I can find are listed here [pastebin]. I would ...
In Automation We Trust! (Or Do We?) [Published SecurityWeek RSS Feed - 4 hours ago]
The sad truth is that the security practice lags behind pretty much every other IT discipline when it comes to automation. • Need to spin up compute power? Give me a few seconds. A new virtual server may even be spun up automatically when the workload ...
1 2 3 4 5 6 7 8 9 10 ...

Audio/Video

sort by: Date | Relevance
Target, Neiman Marcus apologize for security br... [Published Reuters Video: Top News - Feb 04 2014]
President Obama's Sit Down Before the Super Bowl [Published Wall Street Journal What's News - Feb 03 2014]
1

Press Releases

sort by: Date | Relevance
FireEye Highlights Importance of Multi-Flow Ana... [Published GlobeNewswire: Acquisitions News - Apr 08 2014]
Speech: Cyber security: City Week 2014 [Published Keeping the UK safe in cyber space - Activity o ... - Mar 31 2014]
New FireEye Advanced Threat Report Reveals Glob... [Published GlobeNewswire: Advertising News - Feb 27 2014]
Microsoft enters into new global partnerships i... [Published Microsoft Press Releases - Feb 12 2014]
Kaspersky Lab Uncovers "The Mask": One of the M... [Published Financial Services - Feb 11 2014]
1 2 3 4 5 6 7
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.